Works matching DE "COMPUTER worms"


Results: 115
    1
    2
    3

    NADTW: new approach for detecting TCP worm.

    Published in:
    Neural Computing & Applications, 2017, v. 28, p. 525, doi. 10.1007/s00521-016-2358-9
    By:
    • Anbar, Mohammed;
    • Abdullah, Rosni;
    • Munther, Alhamza;
    • Al-Betar, Mohammed;
    • Saad, Redhwan
    Publication type:
    Article
    4
    5
    6
    7

    NEA: Public Health for the Network.

    Published in:
    IEEE Internet Computing, 2010, v. 14, n. 3, p. 77, doi. 10.1109/MIC.2010.72
    By:
    • Hanna, Steve;
    • Thomson, Susan
    Publication type:
    Article
    8
    9
    10
    11
    12
    13
    14
    15
    16

    Collective classification for spam filtering.

    Published in:
    Logic Journal of the IGPL, 2013, v. 21, n. 4, p. 540, doi. 10.1093/jigpal/jzs030
    By:
    • Laorden, Carlos;
    • Sanz, Borja;
    • Santos, Igor;
    • Galán-García, Patxi;
    • Bringas, Pablo G.
    Publication type:
    Article
    17
    18
    19
    20
    21
    22
    23

    A stochastic worm model.

    Published in:
    Telecommunication Systems, 2017, v. 64, n. 1, p. 135, doi. 10.1007/s11235-016-0164-4
    By:
    • Zhou, Hanxun;
    • Guo, Wei
    Publication type:
    Article
    24
    25
    26
    27
    28
    29

    Modeling and Detection of Camouflaging Worm.

    Published in:
    IEEE Transactions on Dependable & Secure Computing, 2011, v. 8, n. 3, p. 377, doi. 10.1109/TDSC.2010.13
    By:
    • Wei Yu;
    • Xun Wang;
    • Calyam, Prasad;
    • Dong Xuan;
    • Wei Zhao
    Publication type:
    Article
    30
    31

    The Cyber Attack on Saudi Aramco.

    Published in:
    Survival (0039-6338), 2013, v. 55, n. 2, p. 81, doi. 10.1080/00396338.2013.784468
    By:
    • Bronk, Christopher;
    • Tikk-Ringas, Eneken
    Publication type:
    Article
    32

    Stuxnet and the Future of Cyber War.

    Published in:
    Survival (0039-6338), 2011, v. 53, n. 1, p. 23, doi. 10.1080/00396338.2011.555586
    By:
    • Farwell, JamesP.;
    • Rohozinski, Rafal
    Publication type:
    Article
    33
    34
    35
    36
    37
    38
    39

    Grid-Based Internet Worm Behavior Simulator.

    Published in:
    International Journal of Intelligent Information Technology Application, 2009, v. 2, n. 3, p. 111
    By:
    • Yang Liu;
    • Bai-ling Wang;
    • Kai-kun Dong;
    • Le-jun Chi;
    • Ci Zhang;
    • Ming Rao
    Publication type:
    Article
    40
    41
    42
    43
    44
    45
    46

    Random Security News.

    Published in:
    ISSA Journal, 2019, v. 17, n. 2, p. 7
    By:
    • Slade, Robert
    Publication type:
    Article
    47
    48
    49
    50